|Listed in category:
This item is out of stock.
Have one to sell?

Real 802.11 Security: Wi-Fi Protected Access and 802.11i

by Edney, Jon; Arbaugh, William | PB | Acceptable
Condition:
Acceptable
Readable copy. Pages may have considerable notes/highlighting. ~ ThriftBooks: Read More, Spend ... Read moreAbout condition
Price:
US $4.82
ApproximatelyEUR 4.51
Postage:
Free Economy Shipping. See detailsfor postage
Located in: Aurora, Illinois, United States
Delivery:
Estimated between Sat, 22 Jun and Tue, 25 Jun to 43230
Delivery time is estimated using our proprietary method which is based on the buyer's proximity to the item location, the delivery service selected, the seller's delivery history and other factors. Delivery times may vary, especially during peak periods.
Returns:
30 days return. Seller pays for return postage. See details- for more information about returns
Payments:
    

Shop with confidence

eBay Money Back Guarantee
Get the item you ordered or your money back. 

Seller information

Registered as a business seller
Seller assumes all responsibility for this listing.
eBay item number:196149870556
Last updated on 11 Jun, 2024 11:04:52 BSTView all revisionsView all revisions

Item specifics

Condition
Acceptable
A book with obvious wear. May have some damage to the book cover but the book is still completely intact. The binding may be slightly damaged around the edges but it is still completely intact. May have some underlining and highlighting of text and some writing in the margins, but there are no missing pages or anything else that would compromise the readability or legibility of the text. See the seller’s listing for full details and description of any imperfections. See all condition definitionsopens in a new window or tab
Seller notes
“Readable copy. Pages may have considerable notes/highlighting. ~ ThriftBooks: Read More, Spend ...
Binding
Paperback
Weight
1 lbs
Product Group
Book
IsTextBook
Yes
ISBN
9780321136206
Subject Area
Computers
Publication Name
Real 802. 11 Security : Wi-Fi Protected Access and 802. 11i
Item Length
9.2 in
Publisher
Addison Wesley Professional
Subject
Data Transmission Systems / Wireless, Security / General, Security / Networking
Publication Year
2003
Type
Textbook
Format
Trade Paperback
Language
English
Item Height
1.8 in
Author
Jon Edney, William A. Arbaugh
Item Width
7 in
Item Weight
24.9 Oz
Number of Pages
480 Pages

About this product

Product Information

Providing descriptions of security techniques, this title presents significant clarification of IEEE draft standards.

Product Identifiers

Publisher
Addison Wesley Professional
ISBN-10
0321136209
ISBN-13
9780321136206
eBay Product ID (ePID)
2496236

Product Key Features

Author
Jon Edney, William A. Arbaugh
Publication Name
Real 802. 11 Security : Wi-Fi Protected Access and 802. 11i
Format
Trade Paperback
Language
English
Subject
Data Transmission Systems / Wireless, Security / General, Security / Networking
Publication Year
2003
Type
Textbook
Subject Area
Computers
Number of Pages
480 Pages

Dimensions

Item Length
9.2 in
Item Height
1.8 in
Item Width
7 in
Item Weight
24.9 Oz

Additional Product Features

LCCN
2003-049595
Intended Audience
Scholarly & Professional
Lc Classification Number
Tk5105.59.E36 2004
Table of Content
Preface. Acknowledgments. I. WHAT EVERYONE SHOULD KNOW. 1. Introduction. Setting the Scene. Roadmap to the Book. Notes on the Book. 2. Security Principles. What Is Security? Good Security Thinking. 1. Don''t Talk to Anyone You Don''t Know. 2. Accept Nothing Without a Guarantee. 3. Treat Everyone as an Enemy until Proved Otherwise. 4. Don''t Trust Your Friends for Long. 5. Use Well-Tried Solutions. 6. Watch the Ground You Are Standing on for Cracks. Security Terms. Summary. 3. Why Is Wi-Fi Vulnerable to Attack? Changing the Security Model. What Are the Enemies Like? Gaming Attackers. Profit or Revenge Attackers. Ego Attackers. Traditional Security Architecture. Option 1: Put Wireless LAN in the Untrusted Zone. Option 2: Make Wi-Fi LAN Trusted. Danger of Passive Monitoring. Summary. 4. Different Types of Attack. Classification of Attacks. Attacks Without Keys. Snooping. Man-in-the-Middle Attack (Modification). Attacks on the Keys. One-Time Passwords. Burying the Keys. Wireless Attacks. Attacking the Keys Through Brute Force. Dictionary Attacks. Algorithmic Attacks. Summary. II. THE DESIGN OF WI-FI SECURITY. 5. IEEE 802.11 Protocol Primer. Layers. Wireless LAN Organization. Basics of Operation in Infrastructure Mode. Beacons. Probing. Connecting to an AP. Roaming. Sending Data. Protocol Details. General Frame Formats. AC header. Management Frames. Radio Bits. Summary. 6. How IEEE 802.11 WEP Works and Why It Doesn''t. Introduction. Authentication. Privacy. Use of RC4 Algorithm. Initialization Vector (IV). WEP Keys. Mechanics of WEP. Fragmentation. Integrity Check Value (ICV). Preparing the Frame for Transmission. RC4 Encryption Algorithm. Why WEP Is Not Secure. Authentication. Access Control. Replay Prevention. Message Modification Detection. Message Privacy. RC4 Weak Keys. Direct Key Attacks. Summary. 7. WPA, RSN, and IEEE 802.11i. Relationship Between Wi-Fi and IEEE 802.11. What Is IEEE 802.11i? What Is WPA? Differences Between RSN and WPA. Security Context. Keys. Security Layers. How the Layers Are Implemented. Relationship of the Standards. List of Standards. Pictorial Map. Summary. 8. Access Control: IEEE 802.1X, EAP, and RADIUS. Importance of Access Control. Authentication for Dial-in Users. IEEE 802.1X. IEEE 802.1X in a Simple Switched Hub Environment. IEEE 802.1X in Wi-Fi LANs. EAP Principles. EAP Message Formats. EAPOL. EAPOL-Start. BHEADS = EAPOL-Key. EAPOL-Packet. EAPOL-Logoff. Messages Used in IEEE 802.1X. Authentication Sequence. Implementation Considerations. RADIUS--Remote Access Dial-In User Service. RADIUS Mechanics. EAP over RADIUS. Use of RADIUS in WPA and RSN. Summary. 9. Upper-Layer Authentication. Introduction. Who Decides Which Authentication Method to Use? Use of Keys in Upper-Layer Authentication. Symmetric Keys. Asymmetric Keys. Certificates and Certification Authorities. A Detailed Look at Upper-Level Authentication Methods. Transport Layer Security (TLS). Functions of TLS. Handshake Exchange. Relationship of TLS Handshake and WPA/RSN. TLS over EAP. Summary of TLS. Kerberos V5V5. Using Tickets. Kerberos Tickets. Obtaining the Ticket-Granting Ticket. Service Tickets. Cross-Domain Access. How Tickets Work. Use of Kerberos in RSN. Cisco Light EAP (LEAP). Protected EAP Protocol (PEAP). Phase 1. Phase 2. Status of PEAP. Authentication in the Cellular Phone World: EAP-SIM. Overview of Authentication in a GSM Network. Linking GSM Security to Wi-Fi LAN Security. EAP-SIM. Status of GSM-SIM Authentication. Summary. 10. WPA and RSN Key Hierarchy. Pairwise and Group Keys. Pairwise Key Hierarchy. Creating and Delivering the PMK. Computing the Temporal Keys. Exchanging and Verifying Key Information. Completing the Handshake. Group Key Hierarchy. Summary of the Key Establishment Process. Key Hierarchy Using AES-CCMP. Mixed Environments. S
Copyright Date
2004
Dewey Decimal
005.8
Dewey Edition
21
Illustrated
Yes

Item description from the seller

Business seller information

Thrift Books Global, LLC
TB Thrift Books
18300 Cascade Ave S
Ste 150
98188 Seattle, WA
United States
Show contact information
:liamEmoc.skoobtfirht@yabe.selas
I certify that all my selling activities will comply with all EU laws and regulations.
ThriftBooks

ThriftBooks

99% positive Feedback
17.7M items sold
Usually responds within 24 hours

Detailed seller ratings

Average for the last 12 months

Accurate description
4.9
Reasonable postage cost
5.0
Delivery time
5.0
Communication
4.9
Registered as a business seller

Seller Feedback (5,220,631)

n***u (279)- Feedback left by buyer.
Past month
Verified purchase
Fast shipping
z***z (27)- Feedback left by buyer.
Past month
Verified purchase
I have received the goods safely. It was a wonderful deal!! Thank you very much!
e***w (382)- Feedback left by buyer.
Past month
Verified purchase
Thank you